Posts Tagged ‘windows’

Remember: Windows Vista Support Ends Next Month

Monday, March 13th, 2017

Just in case there are still a few Windows Vista users out there, don’t forget that the end is near.

Microsoft plans to end the extended support for its operating system Windows Vista next month so that no further security updates will be released for the OS. The client Windows lifecycle sheet on Microsoft’s website lists April 11, 2017 as the end of support. Microsoft will release security patches for Windows Vista on that day, and stop support for the operating system afterwards.

(more…)

Smaller Windows Updates Thanks to Differential Packages

Tuesday, March 7th, 2017

This probably explains why recent Windows updates seem to download and install a lot faster than they did a year or two ago.

Microsoft began to roll out its new Unified Update Platform last year, first on mobile and then for Windows 10 Insider Builds as well. One of the advantages of the platform was the use of differential update packages. This meant, all in all, that update packages would be a lot smaller going forward. While updates are released regularly for retail versions of Windows 10, the advantages of differential update packages become visible the most when feature updates are released.

(more…)

Report – Non-Admin Accounts Mitigate 94% of Critical Windows Vulnerabilities

Wednesday, March 1st, 2017

This probably goes without saying, but here it is anyway, just in case anyone needs a reminder.

A new report suggests that Windows admins and users could mitigate 94% of all critical vulnerabilities automatically by running non-admin accounts. It is common sense that using standard user accounts on Windows, opposed to accounts with elevated privileges, is a good security practice. The main reason behind this practice is simple: if a user cannot perform certain operations due to limited rights, then malware can’t perform those operations either.

(more…)

Google Discloses Another Unpatched Windows Vulnerability

Monday, February 20th, 2017

This bug was discovered way back in November, 2016, but at present it doesn’t look like Microsoft has addressed the vulnerability yet.

Google Project Zero member Mateusz Jurczyk disclosed a gdi32.dll vulnerability in the Windows operating system to Microsoft on November 16, 2016. The report itself is quite technical and it would go too far to go into details here on the site. The following describes the turn of events however.

(more…)

SMB Zero-Day Affects Windows 8, 10 and Server

Friday, February 3rd, 2017

If your system is displaying a blue screen, this might help to explain it …

The United States Computer Emergency Readiness Team (US-CERT) published a vulnerability note yesterday about a new zero-day vulnerability affecting Microsoft Windows 8, 10 and Server editions.

(more…)

Microsoft Security Updates – January 2017

Wednesday, January 11th, 2017

Here’s a quick summary of the first Microsoft Security Updates of 2017.

It’s the second Tuesday of the month, and that means it is once again Patch Day over at Microsoft. The company has released security updates and non-security updates for client and server versions of its Windows operating system, as well as for other company products today. Our guide provides you with information on these updates. It lists all security bulletins that Microsoft released this month, and all non-security updates and security advisories.

(more…)

Disable Nvidia Telemetry Tracking on Windows

Tuesday, November 8th, 2016

Privacy Protection is a never-ending task; there’s always some new threat on the horizon to deal with.

Telemetry — read tracking — seems to be everywhere these days. Microsoft pushes it on Windows, and web and software companies use it as well. While there is certainly some benefit to it on a larger scale, as it may enable these companies to identify broader issues, it is undesirable from a user perspective. Part of that comes from the fact that companies fail to disclose what is being collected and how data is stored and handled once it leaves the user system.

(more…)

AtomBombing: Zero-Day Windows Exploit

Monday, October 31st, 2016

Just in case you didn’t have enough security issues to worry about already …

Ensilo security researchers have discovered a new zero-day exploit in Windows that attackers can make use of to inject and execute malicious code. The researches call the exploit AtomBombing because of its use of a Windows function called Atom Tables. What’s particularly interesting about the exploit is that it does not rely on security vulnerabilities in Windows components but native Windows functions.

(more…)

Windows Upgrade Error Codes Decrypted

Friday, October 14th, 2016

When you run into a problem while upgrading Windows, it definitely helps to be able to see what the error code is trying to tell you.

So you tried to upgrade your Windows machine to Windows 10 and it did not work. Got the cryptic error code 0x80070070 thrown at you, for instance when you check the Event Viewer, but have no idea what it means. A search on the Internet shows that other users experienced the same issue, but most of what is suggested is guesswork. Did you know that these error codes follow a specific pattern that you can easily decrypt? It is actually pretty easy provided that you know where to look for the information.

(more…)

Quickly Analyze Windows Update Errors

Wednesday, October 12th, 2016

In light of recent problems with Windows Updates, this seems like an extremely useful tool for Windows 10 users.

It is unclear how many Windows users and administrators run into updating issues on Windows machines regularly or occasionally. Updating issues can be frustrating, especially if the system lands in an endless cycle of downloads, installs, reboots and rollbacks that frustrate many users and system admins. The past year alone has seen several borked updates that caused issues on Windows 10 machines.  The Windows 10 updates KB3081424 and KB3194496 caused issues on PCs around the world for instance.

(more…)